Clients often want to know the progress during testing, and sometimes IT/SOC staff want to know if a recent change in a configuration or activity is related to our testing (vs. a possible unauthorized attacker). Because of this, during testing, we relay information in the following ways:

  • Secure communications and file transfer avenues to ensure your information remains protected
  • Access to a live “blog” of sorts, which contains the following:
    • security engineers’ real-time, unedited, unfiltered notes about where they currently are in the testing process
    • what has already been tested/attacked
    • exploits used
    • any changes/modifications to your network as part of the testing.
    • See example here:
  • Immediate notification if an imminent risk or compromise is identified
  • 24-7 support – name, phone number, and email address of all security engineers performing tests

Schedule a no obligation consultation with PEN Consultants today! Information & Cybersecurity Testing - Penetration Testing, Red Teaming, Vulnerability Scanning and Assessment services for Apps, Web Apps, Network, Wireless, and more!